Specific Similarity Measure for Terrorist Networks: How Much Similar Are Terrorist Networks of Turkey?

  • Fatih Ozgul
  • Ahmet Celik
  • Claus Atzenbeck
  • Zeki Erdem
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6749)

Abstract

Some countries suffer from terrorism much more than others, Turkey as one of the most suffering countries who owns about a hundred terrorist groups; most of these organizations cooperate, and interchange knowledge, skills, materials used for terrorist attacks. From criminological perspective terrorist networks of Turkey are categorized into three main groups: extreme left (i.e. Marxist) networks, extreme right (i.e. Fundamentalist, Radical Islamist) networks, and separatist (i.e. ethic, racist) networks. By using their criminal history including the selection of crimes, attacking methods and modus operandi, a crime ontology is created, terrorist networks are attached to this ontology via their attacks and a similarity measure (COSM) is developed according to this ontology. Results of this similarity measure performed better than two common similarity measures; cosine and Jaccard. Results are also presented to domain experts in hierarchical clustering and they also commented as positive. Based on attributes of crimes, COSM similarity can also be applied to other types of social networks.

Keywords

Terrorist networks similarity crime ontology cosine Jaccard 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Asaro, C., Biasiotti, M.A., Guidotti, P., Papini, Sagri, M., Tiscornia, D.: A Domain Ontology: Italian Crime Ontology. In: ICAIL 2003 Workshop on Legal Ontologies & Web Based Legal Information Management (2003)Google Scholar
  2. 2.
    Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.: Introduction to Algorithms, 2nd edn. (2001)Google Scholar
  3. 3.
    Dzemydeiene, D., Kazemikaitiene, E.: Ontology-based decision supporting system for crime investigation processes. Information Systems Development: Advances in Theory, Practice and Education, 427–438 (2005)Google Scholar
  4. 4.
    Kingston, J., Schafer, B., Vandenberghe, W.: Towards a Financial Fraud Ontology: A Legal Modelling Approach. Journal of Artificial Intelligence and Law 12(4), 419–446 (2004) ISSN 0924-8463CrossRefGoogle Scholar
  5. 5.
    LaFree, G., Dugan, L.: Global Terrorism Database 1.1 and II, 1970-1997, and 1998-2004 ICPSR22541-v1, ICPSR22600- v2. Inter University Consortium for Political and Social Research, Ann Arbor (2008)Google Scholar
  6. 6.
    Lazarevich, A.: Use of ontologies and probabilistic relational models to aid in cyber crime investigation decision support. George Mason University, Washington D.C., US, Ph.D. thesis (2005)Google Scholar
  7. 7.
    Macrimeanalysts, Massachusetts Association of Crime Analysts Home Page (2010), http://www.macrimeanalysts.com/articles/classification.pdf (accessed at February 12, 2010)
  8. 8.
    Marcus, S.M., Moy, M., Coffman, T.: Social Network Analysis in Mining Graph Data, Cook, D.J., Holder, L.B. (eds.). John Wiley &Sons, Inc., Chichester (2007)Google Scholar
  9. 9.
    Skillicorn, D.: Knowledge Discovery for Counterterrorism and Law Enforcement. CRC Press, Boca Raton (2009)Google Scholar
  10. 10.
    Spertus, E., Sahami, M., Buyukkokten, O.: Evaluating similarity measures: a large-scale study in the orkut social network. In: Proceedings of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery in Data Mining (KDD 2005), pp. 678–684. ACM, New York (2005)CrossRefGoogle Scholar
  11. 11.
    Protégé, Standford University (2010), http://protege.stanford.edu/overview/ (accessed at February 12, 2010)
  12. 12.
    Wasserman, S., Faust, K.: Social Network Analysis Methods and Applications. Cambridge University Press, Cambridge (1994)CrossRefMATHGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Fatih Ozgul
    • 1
  • Ahmet Celik
    • 2
  • Claus Atzenbeck
    • 3
  • Zeki Erdem
    • 4
  1. 1.Faculty of Computing, Science & TechnologyUniversity of SunderlandUK
  2. 2.Institute of Information SystemsHof UniversityGermany
  3. 3.Diyarbakir A.Gaffar Okkan Vocational School, National PoliceDiyarbakirTurkey
  4. 4.TUBITAK- UEKAE, Information Technologies InstituteGebzeTurkey

Personalised recommendations